nickboucher / imperceptible
Bad Characters: Imperceptible NLP Attacks
☆34Updated 10 months ago
Alternatives and similar repositories for imperceptible:
Users that are interested in imperceptible are comparing it to the libraries listed below
- ☆9Updated 3 years ago
- Natural Language Attacks in a Hard Label Black Box Setting.☆46Updated 3 years ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆22Updated 3 years ago
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆41Updated 2 years ago
- Hidden backdoor attack on NLP systems☆47Updated 3 years ago
- Repo for arXiv preprint "Gradient-based Adversarial Attacks against Text Transformers"☆103Updated 2 years ago
- Official implementation of the EMNLP 2021 paper "ONION: A Simple and Effective Defense Against Textual Backdoor Attacks"☆32Updated 3 years ago
- Craft poisoned data using MetaPoison☆49Updated 3 years ago
- An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)☆169Updated last year
- TrojanLM: Trojaning Language Models for Fun and Profit☆15Updated 3 years ago
- ☆17Updated 2 years ago
- ☆142Updated 4 months ago
- ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation☆50Updated 2 years ago
- Code for the paper "Weight Poisoning Attacks on Pre-trained Models" (ACL 2020)☆140Updated 3 years ago
- ☆24Updated 2 years ago
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆24Updated 3 years ago
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆42Updated 2 years ago
- ☆23Updated 2 years ago
- ☆64Updated 4 years ago
- Code and data of the ACL 2021 paper "Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution"☆16Updated 3 years ago
- ☆93Updated 4 years ago
- ☆44Updated 3 years ago
- ☆18Updated 11 months ago
- ☆79Updated 3 years ago
- ☆31Updated 2 years ago
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆70Updated 6 years ago
- ☆23Updated 2 years ago
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Updated 2 years ago
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆27Updated 3 years ago
- ☆24Updated 3 years ago